Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2022

Fortune and Great Place to Work® Name Forward Networks One of the 2022 Best Small Workplaces, Ranking #20 Nationally

Great Place to Work® and Fortune magazine have honored Forward Networks as one of the 2022 Best Small Workplaces. This is Forward Networks' first time being named to this prestigious list, this year coming in at 20th place nationally. Earning a spot means that Forward Networks is one of the best companies to work for in the country.

Improving CrowdStrike Falcon Detection Content with the Gap Analysis Team

CrowdStrike is always looking for innovative ways to improve detection content for our customers. We believe a multifaceted approach that combines customer input, standardized testing and internal research is necessary to stop breaches today and in the future. At CrowdStrike, we never rest, because neither does the adversary.

Vulnerability Scans Are a Must but Not Enough

Vulnerability scans test for different misconfigurations and report the vulnerabilities. But they have 2 big drawbacks: You need to get consent from a company before you do a vulnerability scan on them. You may get a very rigorous readout from a vulnerability scan. But then a sleep-deprived IT administrator misconfigured the system, making your report irrelevant. On the other hand, security ratings don’t need anybody’s consent and provide continuous, real-time monitoring.

Identity Theft: 5 Different Types & How to Protect Yourself

Identity theft is a serious problem that can have a lasting impact on your life. If your identity is stolen, it can be used to open new accounts, make purchases, and commit other crimes. The impact of identity theft can be devastating, but there are steps you can take to protect yourself. In this post, we'll discuss what identity theft is and how you can prevent it from happening.


AWS re:Inforce 2022 recap

If you’re looking to catch up on what happened at this years AWS re:Inforce, this is the blog for you. There were many important announcements were this year, including some exciting updates on the cloud security front. In this post, we’ll quickly review the goals of the conference and who should attend, before diving into the keynote highlights, software updates, and helpful resources.


How to Rebrand 'Bossware' at Your Company

Gone are the days where bosses could simply walk by an employee’s desk and peek at their computer screen to see if they were on task. At the end of last year, 45% of full-time employees worked from home at least part of the time, and many want to keep it that way. Enter employee monitoring, not-so-affectionally known as “bossware.” It’s software that companies install to better understand what it is their employees are doing all day.


Driving quantified success with Elastic Security

Insights from the 2022 Results That Matter study “88% of boards regard cybersecurity as a business risk rather than solely a technical IT problem.”1 Regardless of geography, industry, sector, or use cases, most would agree that reducing risk is a top priority for their organization. Whether it’s decreasing phishing scams, ransomware, and malware attacks or reducing the risk of customer churn due to breaches, security is everyone’s concern.


The Importance of a Machine Learning-Based Source Code Classifier

This is the fifth in a series of articles focused on AI/ML. Source code is a critical part of an organization’s intellectual property and digital assets. As more and more centralized source code repositories are moving to the cloud, it is imperative for organizations to use the right security tools to safeguard their source code.

Pentest People

Ransomware 2022: Facts and Statistics

In 2021, Ransomware Attacks cost businesses an estimated $11.5 billion. But that’s just the beginning of the story. What about all the other consequences of ransomware attacks? How do they affect businesses? In this blog post, we’ll take a look at some of the most important ransomware facts and statistics for 2021. We’ll also discuss what businesses can do to protect themselves from these devastating attacks.

Arctic Wolf

CVE-2022-31656 - Critical Authentication Bypass Vulnerability in Multiple VMware Products

On Tuesday, August 2, 2022, VMware disclosed a critical-severity authentication bypass vulnerability (CVE-2022-31656) impacting multiple VMware products, including VMware’s Workspace ONE Access, Identity Manager (vIDM), and vRealize automation. If successfully exploited, the vulnerability could allow a threat actor with network access to the user interface to obtain administrative access without needing to authenticate.